Perimeter
4/25/2011
09:41 PM
Tom Parker
Tom Parker
Commentary
50%
50%

A Not-So Targeted Targeted Attack

RSA was likely among several targets associated with a broader campaign that was designed to seek out industrial secrets

Several weeks before news of the RSA compromise broke, a good friend and industry colleague here in D.C. received an email, purportedly from a well-known industry expert on terrorism studies.

The subject of the email touted a listing of risk assessment security organizations, and the attachment appeared to be just that -- an Excel spreadsheet containing a list of many of the major security industry organizations. Embedded within the document was a series of Flash Action Script (rev3), which, in and of itself, is a feature and not necessarily malevolent. However, it all goes Pete Tong from here as the action script then manifested a Shockwave Flash payload, triggering an uninitialized memory reference flaw, which can result in arbitrary code execution on its target. This vulnerability is now better known as CVE-2011-0609.

Some further investigation revealed that my contact was not the only recipient of this email: It had been sent out to a number of other individuals within the security industry -- in likelihood, somewhere in the ballpark of about 100 individuals.

So we have a previously unpatched flaw in Flash 9 and 10 being sent to prominent members of the community in a not-so-convincing email. Prior to understanding the scale on which this exploit had been used, my first thought was that this was not a targeted attack. To begin with, the email lure was on point in terms of genre, but lacked any of the more convincing specifics that are generally associated with highly targeted attacks.

Second, the payload of the overflow was intended to manifest a Windows executable, and Windows-based RAT (Remote Access Tool). Why does this mean it wasn’t targeted? Well, anyone with any degree of familiarity with the individual who it was sent to knows that the person concerned is a huge Mac user and seldom uses a Windows environment -- especially when it comes to everyday tasks, such as emailing and using Microsoft Office.

So this was either a huge waste of an 0day, and the attacker spent all of his time on exploit development rather than target reconnaissance, or the exploit was intended for a broader audience. News of similar emails sent to similarly placed members of the industry (including some former, high-ranking national security policy-makers) confirmed the latter.

And then there was RSA. Unfortunately, but for good reason, not a lot of technical specifics have been made publicly available by RSA; however, it is clear from what has been released that the phishing email did indeed try to coax RSA employees into opening its attachment through promising details of the “2011 Recruitment Plan,” and was directed toward a "small group of users." RSA have additionally confirmed that the email came complete with an Excel spreadsheet attachment, which exploited the very same Flash vulnerability (CVE-2011-0609) previously used in the aforementioned attacks. This immediately raised some serious questions in my mind as to how targeted the attacks against RSA really were.

As any good follower of TV crime drama knows, when a stolen weapon is used in a crime, it can frequently be used to connect the dots to other crimes involving the same weapon. In many cases, it also provides leads that could eventually lead to the identification of the aggressor. As such, "clean" weapons are the choice tool of the smart criminal, given that a "dirty" weapon might land him in the slammer.

In the cyberdomain, we are similarly able to trace an actor’s field craft between incidents, gain a much clearer picture of motive, and often gather a more complete dataset of forensic evidence. Sophisticated adversaries are aware of this fact and will plan accordingly when engaging in a highly targeted attack, where remaining undetected and unattributed are of utmost concern. And so, while there is much about the RSA attack that has been left to speculation, I believe it’s of importance to put the information which is available into context of other goings-on, especially when it comes to targeting and the true sophistication of the attack.

Is it true to say that RSA was targeted? Sort of.

From the information available, I believe, that RSA was indeed a target, but one of many targets associated with a broader campaign designed to seek out industrial secrets. This is very similar to the modus operandi used by other recent attacks against industry, including the Night Dragon attacks publicized by McAfee in February.

Did those responsible behind the RSA attack develop a specific offensive capability and engage in activities to specifically seek out data associated with RSA’s SecurID and authentication technologies? Absolutely not. All things considered, it is my belief that those behind the RSA hack caught a lucky break, and had never anticipated the level of success that this particular venture might yield.

I believe that clarity around this kind of thing is extraordinarily important when discussing and understanding threats, especially when in conversations with less technical, senior, and executive leadership. If we are led to believe that a nontargeted attack is both targeted and as sophisticated as they come, it sets a psychological bar in our mind's eye that if we introduce specific countermeasures against this level of threat actor, it will be plain sailing from here on out. This is a dangerous precedent to set -- and a precedent that will leave us ill-equipped when the time comes that we really are faced with a threat designed to target discreet weaknesses in an organization.

Tom Parker is director of security consulting services at Securicon.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5208
Published: 2014-12-22
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbit...

CVE-2014-7286
Published: 2014-12-22
Buffer overflow in AClient in Symantec Deployment Solution 6.9 and earlier on Windows XP and Server 2003 allows local users to gain privileges via unspecified vectors.

CVE-2014-8015
Published: 2014-12-22
The Sponsor Portal in Cisco Identity Services Engine (ISE) allows remote authenticated users to obtain access to an arbitrary sponsor's guest account via a modified HTTP request, aka Bug ID CSCur64400.

CVE-2014-8017
Published: 2014-12-22
The periodic-backup feature in Cisco Identity Services Engine (ISE) allows remote attackers to discover backup-encryption passwords via a crafted request that triggers inclusion of a password in a reply, aka Bug ID CSCur41673.

CVE-2014-8018
Published: 2014-12-22
Multiple cross-site scripting (XSS) vulnerabilities in Business Voice Services Manager (BVSM) pages in the Application Software in Cisco Unified Communications Domain Manager 8 allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug IDs CSCur19651, CSCur18555, CSCur1...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.